General
-
Target
c3ca6be22568f162549a411b768a662c3b1792d0ecbe33466835ccc46b70f559
-
Size
98KB
-
Sample
220520-z437wsgfcl
-
MD5
ea6a09aa2e08cd0157b6ab57a8d18f91
-
SHA1
c98d2ca13735ed3cf522dc67aa5ffc71497153e8
-
SHA256
c3ca6be22568f162549a411b768a662c3b1792d0ecbe33466835ccc46b70f559
-
SHA512
8f00c947ff427c2f02f67ec13c179d06aab0b6340db45a6e8961184b0d7177a44c1fa45e6160c50857cce34ca3d732117a3982007ad3fd9280442419dce8c8c4
Static task
static1
Behavioral task
behavioral1
Sample
sample.doc
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
sample.doc
Resource
win10v2004-20220414-en
Malware Config
Extracted
http://manandvanwaterlooville.co.uk/wp-admin/prX892/
https://uniral.com/captchasignup/4J579681/
https://scyzm.net/lkx7/lqoH8S/
https://amagna.nl/DZ9MzAobu3/37Z/
https://nilinkeji.com/online/90fb31/
Targets
-
-
Target
sample
-
Size
169KB
-
MD5
420a90f5c00d78de1053dad31408582c
-
SHA1
b897f39976bf0eeec833b47558550765cf16df54
-
SHA256
e49e34bfeed9d527f6a2c80df9f388d89705278aafa1aa2b250556754ac38944
-
SHA512
e193f40b16fa11240ffc746d0f894d68c200c7641bb393d68f9551e5668d230a4070dbdd62a34daed980cd951f229791d79bb5906efb5c35e295bda685d81e6a
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-